IOC Report
103__Installer.exe

loading gif

Files

File Path
Type
Category
Malicious
103__Installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_103__Installer.e_543e9b5bf1d99de7872b8c34a610dcac6fe4_9792b471_b8d55630-627c-4954-8814-5f2f94326423\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5186.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Jul 2 17:28:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER535C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER537C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Downloads\ind.jpg
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\103[1].ccp
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\103__Installer.exe
"C:\Users\user\Desktop\103__Installer.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7572 -s 2096

URLs

Name
IP
Malicious
59.56.110.103
malicious
http://upx.sf.net
unknown
http://guanlix.cn:881/103.ccp
91.208.240.157
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://guanlix.cn:881/103.ccpq
unknown

Domains

Name
IP
Malicious
guanlix.cn
91.208.240.157

IPs

IP
Domain
Country
Malicious
59.56.110.103
unknown
China
malicious
91.208.240.157
guanlix.cn
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
ProgramId
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
FileId
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
LowerCaseLongPath
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
LongPathHash
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
Name
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
OriginalFileName
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
Publisher
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
Version
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
BinFileVersion
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
BinaryType
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
ProductName
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
ProductVersion
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
LinkDate
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
BinProductVersion
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
AppxPackageFullName
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
AppxPackageRelativeId
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
Size
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
Language
\REGISTRY\A\{7c09b3f0-7e8a-1b15-652a-e1daa72e3956}\Root\InventoryApplicationFile\103__installer.e|ee5c22d6b8bb21a4
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5F70000
trusted library section
page read and write
malicious
3DB1000
trusted library allocation
page read and write
malicious
5FB0000
trusted library allocation
page read and write
3D70000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
663D000
stack
page read and write
60B0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
3B50000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5F6E000
stack
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
156B000
heap
page read and write
6086000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
3D79000
trusted library allocation
page execute and read and write
5FC0000
trusted library allocation
page read and write
3AF0000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
B93000
unkown
page readonly
3AB0000
direct allocation
page execute and read and write
627A000
stack
page read and write
7040000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6AFD000
stack
page read and write
677C000
stack
page read and write
14DD000
heap
page read and write
6081000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
B71000
unkown
page execute read
3B10000
trusted library allocation
page read and write
14C5000
heap
page read and write
6090000
trusted library allocation
page read and write
3D76000
trusted library allocation
page execute and read and write
6080000
trusted library allocation
page read and write
3CD8000
trusted library allocation
page read and write
60D0000
heap
page execute and read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
152A000
heap
page read and write
6080000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5F80000
trusted library allocation
page execute and read and write
7040000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
3D73000
trusted library allocation
page read and write
37DF000
stack
page read and write
6070000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6091000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
3AE0000
trusted library section
page read and write
66FE000
stack
page read and write
6080000
trusted library allocation
page read and write
6379000
stack
page read and write
13F0000
heap
page read and write
1579000
heap
page read and write
6090000
trusted library allocation
page read and write
3B04000
trusted library allocation
page read and write
151F000
heap
page read and write
6080000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
3BB0000
trusted library allocation
page read and write
F2C000
stack
page read and write
6030000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6380000
heap
page read and write
3B3B000
trusted library allocation
page execute and read and write
6080000
trusted library allocation
page read and write
6393000
heap
page read and write
5FB0000
trusted library allocation
page read and write
3BC7000
heap
page read and write
B71000
unkown
page execute read
3B40000
trusted library allocation
page execute and read and write
7050000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
1505000
heap
page read and write
5FB0000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6050000
heap
page read and write
6C3E000
stack
page read and write
6030000
trusted library allocation
page read and write
7004000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
1528000
heap
page read and write
5F2E000
stack
page read and write
5FA0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
B89000
unkown
page readonly
1907000
heap
page read and write
3CCE000
stack
page read and write
6080000
trusted library allocation
page read and write
6EC0000
heap
page read and write
6070000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6386000
heap
page read and write
B70000
unkown
page readonly
1501000
heap
page read and write
5FB0000
trusted library allocation
page read and write
3AD0000
trusted library section
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
1490000
heap
page read and write
7060000
trusted library allocation
page read and write
B8F000
unkown
page write copy
6080000
trusted library allocation
page read and write
36DE000
stack
page read and write
6090000
trusted library allocation
page read and write
7045000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
3BC0000
heap
page read and write
14F0000
heap
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
149A000
heap
page read and write
69FC000
stack
page read and write
63AC000
heap
page read and write
3DA0000
heap
page execute and read and write
6030000
trusted library allocation
page read and write
6C7E000
stack
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
149E000
heap
page read and write
6080000
trusted library allocation
page read and write
F90000
heap
page read and write
60C0000
trusted library allocation
page read and write
5EED000
stack
page read and write
6030000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
1460000
heap
page read and write
6090000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page execute and read and write
66BE000
stack
page read and write
3B60000
heap
page read and write
6081000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
12F7000
stack
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
60B1000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
69BD000
stack
page read and write
18CF000
stack
page read and write
6080000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
14F9000
heap
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
1B00000
heap
page read and write
6080000
trusted library allocation
page read and write
3BAE000
stack
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
68BC000
stack
page read and write
4DBC000
trusted library allocation
page read and write
4DB5000
trusted library allocation
page read and write
17CE000
stack
page read and write
6090000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
7035000
trusted library allocation
page read and write
687E000
stack
page read and write
FF0000
direct allocation
page read and write
FA0000
heap
page read and write
6080000
trusted library allocation
page read and write
673E000
stack
page read and write
6090000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
B70000
unkown
page readonly
6090000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
7040000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
4DB1000
trusted library allocation
page read and write
7F388000
trusted library allocation
page execute and read and write
6090000
trusted library allocation
page read and write
B8F000
unkown
page read and write
13F5000
heap
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
602C000
stack
page read and write
6080000
trusted library allocation
page read and write
3D7C000
trusted library allocation
page execute and read and write
7040000
trusted library allocation
page read and write
60A0000
heap
page read and write
6090000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
1900000
heap
page read and write
6070000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
653E000
stack
page read and write
4271000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
3B00000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
3B37000
trusted library allocation
page execute and read and write
6B3C000
stack
page read and write
667E000
stack
page read and write
6070000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
5DEC000
stack
page read and write
7F370000
trusted library allocation
page execute and read and write
6080000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
3D80000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5FEC000
stack
page read and write
6090000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
B93000
unkown
page readonly
3B03000
trusted library allocation
page execute and read and write
6080000
trusted library allocation
page read and write
1559000
heap
page read and write
B89000
unkown
page readonly
6090000
trusted library allocation
page read and write
6D7D000
stack
page read and write
6090000
trusted library allocation
page read and write
There are 275 hidden memdumps, click here to show them.